Certified Ethical Hacker (CEH) v8: Buffer Overflow

This course is included in the Everything IT Self-Paced training package.


Buffer overflow attacks exploit vulnerabilities in an application due to mishandling of occurrences of data buffers being presented with more data than they were intended to hold. This course looks at buffer overflow attack methodology and tools, and countermeasures. This course is the sixteenth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.

Target Audience

Network and information security professionals





Expected Duraction

60 mins.

Course Objectives

Buffer Overflow Concepts

  • identify types of buffer overflow
  • Buffer Overflow Methodology and Examples

  • sequence the steps in a buffer overflow attack
  • Buffer Overflow Detection

  • sequence the steps for testing for a stack overflow vulnerability
  • Countermeasures and Penetration Testing

  • recognize countermeasures against buffer overflow attacks
  • Buffer Overflow

    This Course is included in our Everything IT Self-Paced Training Package.

      Learn More